Results 151 to 160 of about 9,568 (196)
Some of the next articles are maybe not open access.

Towards a hardware Trojan detection methodology

2014 3rd Mediterranean Conference on Embedded Computing (MECO), 2014
Malicious hardware is a realistic threat. It can be possible to insert the malicious functionality on a device as deep as in the hardware design flow, long before manufacturing the silicon product. Towards developing a hardware Trojan horse detection methodology, we analyze capabilities and limitations of existing techniques, framing a testing strategy
Paris Kitsos, Artemios G. Voyiatzis
openaire   +1 more source

Character Reassignment for Hardware Trojan Detection

2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), 2021
With the current business model and increasing complexity of hardware designs, third-party Intellectual Properties (IPs) are prevalently incorporated into first-party designs. The use of third-party IPs increases security concerns related to hardware Trojans inserted by attackers.
Noah Waller   +4 more
openaire   +1 more source

Survey: Hardware Trojan Detection for Netlist

2020 IEEE 29th Asian Test Symposium (ATS), 2020
The development of integrated circuit technology is accompanied by potential threats. Malicious modifications to circuits, known as hardware Trojans, are major security concerns. This paper gives a survey of hardware Trojan detection methods towards gate-level netlists.
Yipei Yang   +6 more
openaire   +1 more source

Hardware Trojan Detection using Xilinx Vivado

NAECON 2018 - IEEE National Aerospace and Electronics Conference, 2018
Modern commercial EDA tools provide end users with a framework for application specific customizations through a general-purpose programming language interface to an underlying circuit object model. Xilinx Vivado exposes that information through Tcl.
Ryan Marlow   +3 more
openaire   +1 more source

Logic Testing for Hardware Trojan Detection

2017
In this chapter, we describe effective logic testing algorithms for relatively small (less than ten two-input NAND gate equivalent) hardware Trojan detection. Conventional post-manufacturing testing, test generation algorithms, and test coverage metrics cannot be readily extended to hardware Trojan detection. To reduce this lacuna, a novel test pattern
Vidya Govindan, Rajat Subhra Chakraborty
openaire   +1 more source

Power analysis-based Hardware Trojan detection

2017 IEEE National Aerospace and Electronics Conference (NAECON), 2017
Outsourcing of chip product chain makes hardware vulnerable to being attacked. For example, an attacker who has access to hardware fabrication process can alter the genuine hardware with the insertion of concealed hardware elements (Hardware Trojan). Therefore, microelectronic circuit Hardware Trojan detection becomes a key step of chip production.
Hao Xue, Shuo Li, Saiyu Ren
openaire   +1 more source

Improving hardware Trojan detection by retiming

Microprocessors and Microsystems, 2015
Abstract Hardware Trojan horses (HTHs) are challenging threats to the security of silicon chips. A promising solution is path-delay fingerprinting for HTH detection. This paper presents trust-driven retiming ( TDR ) , a synthesis approach to provide a circuit which can be analyzed more effectively by delay fingerprinting.
Seyed Mohammad Hossein Shekarian   +1 more
openaire   +1 more source

Classification of hardware trojan detection techniques

2015 Tenth International Conference on Computer Engineering & Systems (ICCES), 2015
The majority of techniques that have been developed to detect hardware trojans are based on only specific attributes. Further, the ad hoc approaches that have been employed to design methods for trojan detection are largely ineffective. These trojans have a number of attributes which can be used in a systematic way to develop detection techniques ...
Samer Moein   +4 more
openaire   +1 more source

Potential Trigger Detection for Hardware Trojans

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018
Due to the globalization trend of IC industry, more and more chips are designed and/or fabricated by foreign companies and foundries. Among all the consequences of this globalization trend, the possible existence of stealthy-inserted hardware Trojans (HTs) has raised a great security concern.
Minhui Zou   +3 more
openaire   +1 more source

Ring Oscillators and Hardware Trojan Detection

2017
Hardware Trojan horses is a realistic threat in the modern IC supply chain. Once the associate risk is considered, appropriate defense mechanisms must be designed and employed at the various stages in order to detect such hardware malware. We propose two novel uses of ring oscillators, one as an attack vector against hardware implementations of true ...
Paris Kitsos   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy